Improved histograms for selectivity estimation of range predicates
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Answering aggregation queries in a secure system model
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Privacy-Preserving Queries for a DAS Model Using Encrypted Bloom Filter
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
A low cost privacy protection method for SNS by using Bloom filter
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
Database as a Service (DaaS), a form of cloud computing, has recently attracted considerable attention. Users require their sensitive data to be protected from a database administrator that serves as a third party managing the data. We have proposed a secure query execution model for such an environment [10, 11]. Key features of our approach are to represent each tuple of each scheme as a plaintext table with one bloom filter index and to replace queries with keyword searches of the bloom filter index. In [12], we have defined an attack model in which attackers guess features of a plaintext table by observing bit patterns of the bloom filter index: further, we considered a defense against such as attack. We must also assume in this model that attackers can access query logs and may infer features of a plaintext table using such query logs. In this paper, we define an attack model by using query logs and propose a method to defend against the attack by executing fake queries.